Get my own profile
Public access
View all29 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Michael J OudshoornHigh Point UniversityVerified email at highpoint.edu
- Sherif G. AlyProfessor, The American University in CairoVerified email at aucegypt.edu
- Brett A. BeckerUniversity College DublinVerified email at ucd.ie
- Mihaela SabinProfessor of Computer Science, University of New HampshireVerified email at unh.edu
- Allen ParrishExecutive Director, Alabama Cyber Institute, The University of AlabamaVerified email at ua.edu
- Henry M. LevyProfessor and Wissner-Slivka Chair, Paul G. Allen School of Computer Science & EngineeringVerified email at cs.washington.edu
- Norm HutchinsonComputer Science, University of British ColumbiaVerified email at cs.ubc.ca
- Andrew P. BlackPortland State UniversityVerified email at pdx.edu
- J SchneiderRITVerified email at rit.edu
- Eric JulUniversitetet i OsloVerified email at ifi.uio.no
- Teresa PereiraLecturer at University of MinhoVerified email at dsi.uminho.pt
- Ewan TemperoUniversity of Auckland, Victoria University of WellingtonVerified email at auckland.ac.nz
- Stanisław RadziszowskiRochester Institute of TechnologyVerified email at cs.rit.edu
- Henrique SantosProfessor of Information Systems, University of MinhoVerified email at dsi.uminho.pt
- Xumin LiuProfessor, Rochester Institute of TechnologyVerified email at rit.edu
- Edward SobieskProfessor, EECS, United States Military AcademyVerified email at westpoint.edu
- Muhammad Rizwan AsgharUniversity of Surrey, University of AucklandVerified email at surrey.ac.uk
- Eliana StavrouOpen University of CyprusVerified email at ouc.ac.cy
- Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
- Cruz IzuSchool of Computer Science, The University of AdelaideVerified email at adelaide.edu.au
Follow
Rajendra K Raj
Professor of Computer Science, Rochester Institute of Technology
Verified email at cs.rit.edu